User's Manual
Table Of Contents
- Foreword
- Important Safeguards and Warnings
- 1 Overview
- 2 Configuration Flow
- 3 Device Initialization
- 4 Login
- 5 Main Interface
- 6 Setting- 6.1 Local
- 6.2 Camera- 6.2.1 Setting Image Parameters
- 6.2.2 Setting Encode Parameters- 6.2.2.1 Encode
- 6.2.2.2 Overlay- 6.2.2.2.1 Configuring Privacy Masking
- 6.2.2.2.2 Configuring Channel Title
- 6.2.2.2.3 Configuring Time Title
- 6.2.2.2.4 Configuring Location
- 6.2.2.2.5 Configuring Font Properties
- 6.2.2.2.6 Configuring Picture Overlay
- 6.2.2.2.7 Configuring Custom Title
- 6.2.2.2.8 Configuring Target Statistics
- 6.2.2.2.9 Configuring Face Detection
- 6.2.2.2.10 Configuring Face Recognition
- 6.2.2.2.11 Configuring Face Statistics
 
- 6.2.2.3 ROI
 
- 6.2.3 Setting Audio Parameters
 
- 6.3 Network
- 6.4 Event
- 6.5 Storage
- 6.6 System
- 6.7 System Information
- 6.8 Setting Log
 
- 7 Live
- 8 AI
- 9 Camera
- 10 Event
- 11 System
- 12 Security
- 13 Record
- 14 Picture
- 15 Report
- Appendix 1 Cybersecurity Recommendations
Operation Manual 
VIII 
12.4.2 Installing Trusted CA Certificate
 ................................................................................... 123
12.5 A/V Encryption
 ........................................................................................................................ 124
12.6 Security Warning
 ..................................................................................................................... 125
13 Record
 .............................................................................................................................................. 126
13.1 Playback
 ................................................................................................................................... 126
13.1.1 Playing Back Video
 ......................................................................................................... 126
13.1.2 Clipping Video
 ................................................................................................................. 128
13.1.3 Downloading Video
 ........................................................................................................ 129
13.2 Setting Record Control
 ........................................................................................................... 130
13.3 Setting Record Plan
 ................................................................................................................ 131
13.4 Storage
 ..................................................................................................................................... 132
13.4.1 Local Storage
 .................................................................................................................. 133
13.4.2 Network Storage
 ............................................................................................................. 134
13.4.2.1 FTP
 ........................................................................................................................... 134
13.4.2.2 NAS
 .......................................................................................................................... 135
14 Picture
 .............................................................................................................................................. 137
14.1 Playback
 ................................................................................................................................... 137
14.1.1 Playing Back Picture
 ...................................................................................................... 137
14.1.2 Downloading Picture
 ...................................................................................................... 138
14.2 Setting Snapshot Parameters
 ................................................................................................ 139
14.3 Setting Snapshot Plan
 ............................................................................................................ 140
14.4 Storage
 ..................................................................................................................................... 140
15 Report
 ............................................................................................................................................... 141
Appendix 1 Cybersecurity Recommendations
 ................................................................................. 142










